Identity & Access Management

 

Education Level: Advanced

6314 - Combating Hackers and Criminals Using Privileged Access Management

Wednesday, September 27
1:00 PM - 2:00 PM

With the constant need of enabling business with IT, every organization is continuously commissioning new devices making it hard for them to track, secure and audit privileged access on these systems. The equation becomes more complex as the environment expands and multiple vendors/contractors need to access critical systems using their personal devices.

Privileged accounts have extensive access to sensitive data including HR, financial, employee and customer data. Whether deliberately or accidentally, exploited privileged user accounts are usually at the heart of a data breach.

Good privileged access management practices can help your organization stay in control subsequently reducing the risk of a cyber-attack.

Here are five ways privileged access management can prevent a cyber attack:

  • Just in time admin access
  • Compliance visibility
  • Password management
  • Staying in control of the SSH keys
  • Multifactor authentication

    Learning Objectives:

    • Learn how privileged access management can break the kill chain of an attacker.
    • Hear best practices around privileged access management.
    • Discover why a company needs a privileged access management solution.
  • Nitin Uttreja

    Principal, CyberSecurity Engineer
    CA Technologies

    Nitin Uttreja holds an engineering degree and a post-graduate certificate in business management, XLRI. He is a competent professional with more than 11 years of experience in identity and access management, cybersecurity, SAP security and GRC, audit and compliance. He is currently working at CA Technologies as a principal, cybersecurity Engineer with the focus on privileged access management.

    Presentation(s):

    Send Email for Nitin Uttreja

    Robert Primm

    Director, CyberSecurity
    CA Technologies

    Robert Primm, CISSP, CISA, CRISC, is a Director of Cyber Security at CA Technologies, with over ten years experience in Cyber Security, IT Auditing, Compliance, and SAP Security. For the past 5 years, Robert has been managing the team responsible for all aspects of Identity and Access Management, including Privileged Access Management, Role Based Access Control, and SSO.

    Presentation(s):

    Send Email for Robert Primm


    Assets

    6314 - Combating Hackers and Criminals Using Privileged Access Management

    MP3 Audio Slides Video

    Attendees who have favorited this

    Please enter your access key

    The asset you are trying to access is locked. Please enter your access key to unlock.

    Send Email for Combating Hackers and Criminals Using Privileged Access Management